4,413 research outputs found

    Data analytics for TDS-1 GNSS-R Ocean Altimetry Using A "Full DDM" Retrieval Approach

    Get PDF

    High Energy Electron Confinement in a Magnetic Cusp Configuration

    Full text link
    We report experimental results validating the concept that plasma confinement is enhanced in a magnetic cusp configuration when beta (plasma pressure/magnetic field pressure) is order of unity. This enhancement is required for a fusion power reactor based on cusp confinement to be feasible. The magnetic cusp configuration possesses a critical advantage: the plasma is stable to large scale perturbations. However, early work indicated that plasma loss rates in a reactor based on a cusp configuration were too large for net power production. Grad and others theorized that at high beta a sharp boundary would form between the plasma and the magnetic field, leading to substantially smaller loss rates. The current experiment validates this theoretical conjecture for the first time and represents critical progress toward the Polywell fusion concept which combines a high beta cusp configuration with an electrostatic fusion for a compact, economical, power-producing nuclear fusion reactor.Comment: 12 pages, figures included. 5 movies in Ancillary file

    Individual differences in impulsive and risky choice: effects of environmental rearing conditions

    Get PDF
    The present experiment investigated early-rearing environment modulation of individual differences in impulsive and risky choice. Rats were reared in an isolated condition (IC; n = 12), in which they lived alone without novel stimuli, or an enriched condition (EC; n = 12), in which they lived among conspecifics with novel stimuli. The impulsive choice task involved choices between smaller-sooner (SS) versus larger-later (LL) rewards. The risky choice task involved choices between certain-smaller (C-S) versus uncertain-larger (U-L) rewards. Following choice testing, incentive motivation to work for food was measured using a progressive ratio task and correlated with choice behavior. HPLC analyses were conducted to determine how monoamine concentrations within the prefrontal cortex (PFC) and nucleus accumbens (NAC) related to behavior in different tasks. IC rats were more impulsive than EC rats, but they did not differ in risky choice behavior. However, choice behavior across tasks was significantly correlated (i.e., the more impulsive rats were also riskier). There were no group differences in monoamine levels, but noradrenergic and serotonergic concentrations were significantly correlated with impulsive and risky choice. Furthermore, serotonin and norepinephrine concentrations in the NAC significantly correlated with incentive motivation and the timing of the reward delays within the choice tasks. These results suggest a role for domain general processes in impulsive and risky choice and indicate the importance of the NAC and/or PFC in timing, reward processing, and choice behavior

    Distribution of DDS-cerberus Authenticated Facial Recognition Streams

    Get PDF
    Successful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However, researchers have found several security vulnerabilities in DDS implementations. DDS-Cerberus (DDS-C) is a security layer implemented into DDS to mitigate impersonation attacks using Kerberos authentication and ticketing. Even with the addition of DDS-C, the real-time message sending of DDS also needs to be upheld. This paper extends our previous work to analyze DDS-C’s impact on performance in a use case implementation. The use case covers an artificial intelligence (AI) scenario that connects edge sensors across a commercial network. Specifically, it characterizes how DDS-C performs between unmanned aerial vehicles (UAV), the cloud, and video streams for facial recognition. The experiments send a set number of video frames over the network using DDS to be processed by AI and displayed on a screen. An evaluation of network traffic using DDS-C revealed that it was not statistically significant compared to DDS for the majority of the configuration runs. The results demonstrate that DDS-C provides security benefits without significantly hindering the overall performance

    Supersymmetry and Positive Energy in Classical and Quantum Two-Dimensional Dilaton Gravity

    Get PDF
    An N=1N = 1 supersymmetric version of two dimensional dilaton gravity coupled to matter is considered. It is shown that the linear dilaton vacuum spontaneously breaks half the supersymmetries, leaving broken a linear combination of left and right supersymmetries which squares to time translations. Supersymmetry suggests a spinorial expression for the ADM energy MM, as found by Witten in four-dimensional general relativity. Using this expression it is proven that M{M} is non-negative for smooth initial data asymptotic (in both directions) to the linear dilaton vacuum, provided that the (not necessarily supersymmetric) matter stress tensor obeys the dominant energy condition. A {\it quantum} positive energy theorem is also proven for the semiclassical large-NN equations, despite the indefiniteness of the quantum stress tensor. For black hole spacetimes, it is shown that MM is bounded from below by e2ϕHe^{- 2 \phi_H}, where ϕH\phi_H is the value of the dilaton at the apparent horizon, provided only that the stress tensor is positive outside the apparent horizon. This is the two-dimensional analogue of an unproven conjecture due to Penrose. Finally, supersymmetry is used to prove positive energy theorems for a large class of generalizations of dilaton gravity which arise in consideration of the quantum theory.Comment: 21 page

    Quantum Theories of Dilaton Gravity

    Full text link
    Quantization of two-dimensional dilaton gravity coupled to conformal matter is investigated. Working in conformal gauge about a fixed background metric, the theory may be viewed as a sigma model whose target space is parameterized by the dilaton ϕ\phi and conformal factor ρ\rho. A precise connection is given between the constraint that the theory be independent of the background metric and conformal invariance of the resulting sigma model. Although the action is renormalizable, new coupling constants must be specified at each order in perturbation theory in order to determine the quantum theory. These constants may be viewed as initial data for the beta function equations. It is argued that not all choices of this data correspond to physically sensible theories of gravity, and physically motivated constraints on the data are discussed. In particular a recently constructed subclass of initial data which reduces the full quantum theory to a soluble Liouville-like theory has energies unbounded from below and thus is unphysical. Possibilities for modifying this construction so as to avoid this difficulty are briefly discussed.Comment: 20 pages (Major additions made, including 5 pages on the relation between conformal invariance and background independence.

    Quantifying DDS-cerberus Network Control Overhead

    Get PDF
    Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluates a novel security layer, DDS-Cerberus (DDS-C), that protects in-transit data and improves communication efficiency on data-first distribution systems. This research contributes a distributed robotics operating system testbed and designs a multifactorial performance-based experiment to evaluate DDS-C efficiency and security by assessing total packet traffic generated in a robotics network. The performance experiment follows a 2:1 publisher to subscriber node ratio, varying the number of subscribers and publisher nodes from three to eighteen. By categorizing the network traffic from these nodes into either data message, security, or discovery+ with Quality of Service (QoS) best effort and reliable, the mean security traffic from DDS-C has minimal impact to Data Distribution Service (DDS) operations compared to other network traffic. The results reveal that applying DDS-C to a representative distributed network robotics operating system network does not impact performance
    corecore